CN114266051A - Comprehensive malicious code detection system and method in power production system - Google Patents

Comprehensive malicious code detection system and method in power production system Download PDF

Info

Publication number
CN114266051A
CN114266051A CN202210200964.5A CN202210200964A CN114266051A CN 114266051 A CN114266051 A CN 114266051A CN 202210200964 A CN202210200964 A CN 202210200964A CN 114266051 A CN114266051 A CN 114266051A
Authority
CN
China
Prior art keywords
message
bit rate
feedback
transmission
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202210200964.5A
Other languages
Chinese (zh)
Other versions
CN114266051B (en
Inventor
张亮
张晓�
陈坤
裴培
周劼英
詹雄
翟海保
屈刚
郑斌
徐杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
East China Branch Of State Grid Corp ltd
Jiangsu Zhengcai Data Technology Co ltd
Original Assignee
East China Branch Of State Grid Corp ltd
Jiangsu Zhengcai Data Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by East China Branch Of State Grid Corp ltd, Jiangsu Zhengcai Data Technology Co ltd filed Critical East China Branch Of State Grid Corp ltd
Priority to CN202210200964.5A priority Critical patent/CN114266051B/en
Publication of CN114266051A publication Critical patent/CN114266051A/en
Application granted granted Critical
Publication of CN114266051B publication Critical patent/CN114266051B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y04INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
    • Y04SSYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
    • Y04S40/00Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them
    • Y04S40/20Information technology specific aspects, e.g. CAD, simulation, modelling, system security

Abstract

A comprehensive malicious code detection system and a method thereof in an electric power production system comprise the following steps: the method comprises the steps that malicious code prevention client software is arranged on a station terminal in a station and used for searching and killing malicious codes on the station terminal and forming a history message; a management large area collector is arranged in the production control large area; the plant station terminal is connected with the management large area acquisition machine; the plant station terminal and the management large area acquisition machine are connected with an attached server; the defects that in the prior art, historical record messages formed by malicious code prevention client software are only stored locally and are not transmitted to a large management area acquisition machine, the messages acquired by the large management area acquisition machine are incomplete, and the messages of the large management area acquisition machine are blocked so that the historical record messages are omitted during transmission are effectively overcome.

Description

Comprehensive malicious code detection system and method in power production system
Technical Field
The application relates to the technical field of malicious code detection, in particular to a comprehensive malicious code detection system and a comprehensive malicious code detection method in an electric power production system.
Background
The power monitoring system in the power production system is a very important and key core, the power monitoring system takes a computer, communication equipment and a measurement and control unit as basic tools, a basic platform is provided for real-time data acquisition, on-off state detection and remote control of a power transformation and distribution system, the power monitoring system can form a monitoring system with any complexity with detection and control equipment, the core function is played in power transformation and distribution monitoring, enterprises can be helped to eliminate isolated islands, the operation cost is reduced, the production efficiency is improved, and the abnormal response speed in the power transformation and distribution process is accelerated.
That is, the power monitoring system includes a business system and an intelligent device based on computer and network technology for monitoring and controlling the power production and supply process, and a communication and data network as a basic support, etc.
Malicious code refers to computer code that is deliberately programmed or set up to pose a threat or potential threat to a network or system. The damage of the malicious codes to the power monitoring system in the power production system needs to be detected, so that malicious code prevention client software is arranged on a station terminal in a station and used for searching and killing the malicious codes on the station terminal and forming a history message.
In practical application, history information formed by the malicious code prevention client software is usually only stored locally, a management large area acquisition machine in a production control large area in the power production system is used for acquiring various information of a plant station, and the history information formed by the malicious code prevention client software is only stored locally and is not transmitted to the management large area acquisition machine at present, so that the information acquired by the management large area acquisition machine is incomplete.
On the other hand, if the history information formed by the malicious code prevention client software is to be transmitted to the management large area acquisition machine, the defect of message congestion of the management large area acquisition machine is caused because the management large area acquisition machine collects too many messages synchronously, so that the history information is omitted during transmission.
Disclosure of Invention
In order to solve the problems, the application provides a comprehensive malicious code detection system and a transmission method in an electric power production system, and the defects that in the prior art, a historical record message formed by malicious code prevention client software is only stored locally and is not transmitted to a large management area acquisition machine, the message acquired by the large management area acquisition machine is incomplete, and the message of the large management area acquisition machine is blocked so that the historical record message is omitted during transmission are effectively overcome.
In order to overcome the defects in the prior art, the application provides a solution for a comprehensive malicious code detection system and a transmission method in an electric power production system, and the solution is as follows:
an integrated malicious code detection system inside an electric power production system, comprising:
the method comprises the steps that malicious code prevention client software is arranged on a station terminal in a station and used for searching and killing malicious codes on the station terminal and forming a history message; a management large area collector is arranged in the production control large area;
the plant station terminal is connected with the management large area acquisition machine;
the plant station terminal and the management large area acquisition machine are connected with an attached server;
the comprehensive malicious code detection system in the power generation system further comprises:
the system comprises a first creation module, a second creation module and a third creation module, wherein the first creation module is used for creating a message transmission link between a station terminal and a management large-area acquisition machine;
the first registration module is used for obtaining a first information message of the station terminal and executing initial maneuvering registration to obtain a first maneuvering symbol;
the acquisition module I is used for acquiring an information message II reaching the large management area acquisition machine according to the message transmission link, wherein the information message II is acquired after the information message I passes through an initial maneuvering register;
the system comprises a first setting module, a second setting module and a third setting module, wherein the first setting module is used for setting and managing a message feedback protocol of a large-area acquisition machine;
the first maneuvering module is used for obtaining a first feedback number of the second information message from the management large-area acquisition machine according to the message feedback protocol, and executing feedback maneuvering registration to obtain a second maneuvering mark;
the first interception module is used for transmitting the first maneuvering symbol and the second maneuvering symbol to an attached server to obtain a maneuvering interception value, and therefore maneuvering interception is carried out on history record message transmission between the plant station terminal and the management large area acquisition machine.
The comprehensive malicious code detection system in the power generation system further comprises:
the obtaining module II is used for obtaining a first bit rate used for information transmission and a first information message according to the first maneuvering mark;
the obtaining module III is used for obtaining a second bit rate used for information transmission and a second information message according to the second maneuvering mark;
a fourth obtaining module, configured to obtain a bit rate distance amount used for information transfer according to the first bit rate used for information transfer and the second bit rate used for information transfer;
the first identifying module is used for identifying whether the message of the second information message is a message omission or not according to the message of the first information message;
and the forming module I is used for forming a maneuvering interception value I by combining the bit rate distance used for information transmission if the information of the information message II is missed.
The comprehensive malicious code detection system in the power generation system further comprises:
the obtaining module is used for obtaining the permitted critical amount of the feedback number of the station terminal;
a second setting module, configured to set a bit rate recovery mode for information transmission in advance according to the permitted critical amount of the feedback number;
the first evaluation module is used for reversely evaluating the number of the instant feedback numbers of the station terminals according to the distance between the bit rate reply mode used for information transmission and the bit rate used for information transmission;
the second identification module is used for identifying whether the number of the instant feedback numbers reaches the preset warning number or not;
a second forming module, configured to form a first warning message if the number of the instant feedback numbers reaches the preset warning number;
and the deviation rectifying module is used for rectifying the deviation of the maneuvering interception value I according to the warning message I.
The comprehensive malicious code detection system in the power generation system further comprises:
the obtaining module six is used for obtaining the number of the first-level feedback numbers, the number of the second-level feedback numbers and the number of the third-level feedback numbers according to the permitted critical amount of the feedback numbers;
a third forming module, which is used for forming a first bit rate for transmission in advance according to the number of the first-level feedback numbers and the number of the second-level feedback numbers;
a forming module IV, configured to form a bit rate II for transmission setting in advance according to the number of the three-level feedback numbers, where the bit rate II for transmission setting in advance is smaller than the bit rate I for transmission setting in advance;
a second creating module, configured to create a bit rate reply mode for the information transfer according to the first bit rate for the pre-set transfer and the second bit rate for the pre-set transfer.
The comprehensive malicious code detection system in the power generation system further comprises:
a forming module V, wherein the forming module V is used for forming the bit rate used by the first-level transmission according to the number of the first-level feedback numbers;
a sixth forming module, configured to form a bit rate for secondary transmission according to the number of the secondary feedback numbers, where the bit rate for the primary transmission and the bit rate for the secondary transmission are both included in the first bit rate for transmission set in advance, and the bit rate for the primary transmission is greater than the bit rate for the secondary transmission;
a second registration module, configured to perform registration on the bit rate used for the primary transmission to obtain a first registration value, where the first registration value is a number of numbers in a number queue set by the station terminal, and the number of numbers is in a sufficient state;
a third registration module, configured to perform registration on the bit rate used for the secondary transmission to obtain a second registration value, where the second registration value represents a number of numbers in a number queue set by the station terminal, and the number of numbers is in a half-capacity condition;
and the forming module seventh is used for registering the preset second bit rate for transmission to obtain a third registration value, the third registration value indicates the number of the numbers in the number queue set by the station terminal, and the number of the numbers is in the shortage condition and forms the first warning message.
The comprehensive malicious code detection system in the power generation system further comprises:
an obtaining module seven, wherein the obtaining module seven is used for obtaining a primary feedback message I;
the first confirmation module is used for performing confirmation feedback on the second information message transmitted to the large management area acquisition machine according to the first main feedback message;
an obtaining module eight, configured to obtain a first sub-feedback message, where the first sub-feedback message is included in the first information message;
and the confirmation module II is used for executing confirmation feedback on the information message II transmitted to the large management area acquisition machine according to the auxiliary feedback message I.
The comprehensive malicious code detection system in the power generation system further comprises:
a third identifying module, configured to identify whether the second information packet is the same as the first information packet;
and the third confirmation module is used for executing confirmation feedback on the second information message transmitted to the large management area acquisition machine according to the first auxiliary feedback message if the second information message is the same as the first information message.
A method of a comprehensive malicious code detection system inside an electric power production system, comprising the steps of:
step 1, malicious code prevention client software on a plant station terminal performs searching and killing on malicious codes on the plant station terminal and forms a history message, and the history message is stored on the plant station terminal;
step 2, the plant station terminal transmits the history record message to a management large area collector for storage;
the step 2 specifically includes:
step 2-1, establishing a message transmission link between the station terminal and the management large-area acquisition machine;
step 2-2, obtaining an information message I of the station terminal, and executing initial maneuver registration to obtain a maneuver mark I;
the information message one contains the history of delivery, and the maneuver mark one contains the history of delivery and the bit rate used for delivery.
Step 2-3, obtaining an information message II reaching the management large area acquisition machine according to the message transmission link, wherein the information message II is obtained after the information message I passes through an initial maneuvering register;
step 2-4, setting a message feedback protocol for managing the large-area acquisition machine;
step 2-5, obtaining a first feedback number of the management large-area acquisition machine for the information message II according to the message feedback protocol, and executing feedback mobile registration to obtain a second mobile mark;
and 2-6, transmitting the maneuvering symbol I and the maneuvering symbol II to an attached server to obtain a maneuvering interception value, and executing maneuvering interception on history record message transmission between the plant station terminal and the management large area acquisition machine.
Preferably, the steps 2 to 6 include:
step 2-6-1, according to the maneuver mark I, obtaining a bit rate I used for information transmission and a message of an information message I;
step 2-6-2, according to the second maneuvering symbol, obtaining a second bit rate used for information transmission and a second information message;
step 2-6-3, obtaining the bit rate distance amount used for information transmission according to the bit rate I used for information transmission and the bit rate II used for information transmission;
step 2-6-4, according to the message of the first information message, determining whether the message of the second information message is a message omission;
and 2-6-5, if the information of the information message II is missed, combining the bit rate distance quantity used by the information transmission to form a maneuvering interception value I.
Preferably, the steps 2 to 6 further include:
step 2-6-6, obtaining the permitted critical quantity of the feedback number of the station terminal;
step 2-6-7, setting a bit rate recovery mode for information transmission in advance according to the permitted critical amount of the feedback number;
2-6-8, reversely evaluating the number of the instant feedback numbers of the station terminals according to the distance between the bit rate reply mode for information transmission and the bit rate for information transmission;
step 2-6-9, determining whether the number of the instant feedback numbers reaches the preset warning number;
step 2-6-10, if the number of the instant feedback numbers reaches the preset warning number, forming a warning message I;
and 2-6-11, correcting the maneuver interception value I according to the warning message I.
Preferably, the steps 2-6-7 specifically include:
step 2-6-7-1, obtaining the number of first-level feedback numbers, the number of second-level feedback numbers and the number of third-level feedback numbers according to the permitted critical amount of the feedback numbers;
step 2-6-7-2, forming a bit rate I for presetting transmission according to the number of the primary feedback numbers and the number of the secondary feedback numbers;
step 2-6-7-3, forming a bit rate two for preset transmission according to the number of the three-level feedback numbers, wherein the bit rate two for preset transmission is smaller than the bit rate one for preset transmission;
and 2-6-7-4, establishing a bit rate reply mode for the information transmission according to the bit rate I and the bit rate II.
Preferably, after the steps 2-6-7-4, the method further comprises the following steps:
step 2-6-7-5, forming a bit rate for primary transmission according to the number of the primary feedback numbers;
step 2-6-7-6, according to the number of the secondary feedback numbers, forming a bit rate for secondary transmission, wherein the bit rate for the primary transmission and the bit rate for the secondary transmission are both contained in the bit rate I for the preset transmission, and the bit rate for the primary transmission is greater than the bit rate for the secondary transmission;
step 2-6-7-7, registering the bit rate used by the primary transmission to obtain a first registration value, wherein the first registration value represents the number of numbers in a number queue arranged by the station terminal, and the number of the numbers is in a sufficient condition;
step 2-6-7-8, performing registration on the bit rate used by the secondary transmission to obtain a registration value II, wherein the registration value II represents the number of numbers in a number queue arranged by the station terminal, and the number of the numbers is in a half-foot condition;
and 2-6-7-9, registering the bit rate II used for transmission in advance to obtain a third registration value, wherein the third registration value represents the number of numbers in a number queue set by the station terminal, and the number of the numbers is in an insufficient condition and forms the first warning message.
Preferably, the steps 2 to 4 specifically include:
step 2-4-1, obtaining a primary feedback message I;
step 2-4-2, according to the first main feedback message, performing confirmation feedback on the second information message transmitted to the large management area acquisition machine;
step 2-4-3, obtaining a first auxiliary feedback message, wherein the first auxiliary feedback message is contained in the first information message;
and 2-4-4, according to the first auxiliary feedback message, performing confirmation feedback on the second information message transmitted to the large management area acquisition machine.
Preferably, the steps 2-4-4 further comprise:
step 2-4-4-1, determining whether the information message II is the same as the information message I;
and 2-4-4-2, if the second information message is the same as the first information message, performing confirmation feedback on the second information message transmitted to the large management area acquisition machine according to the first auxiliary feedback message.
The invention has the beneficial effects that:
the invention executes initial registration for the data transmission mobility of the data transmission plant station terminal, and also executes two rounds of registration for the information transmission mobility for the number fed back by the management large-area collector, executes attribute comparison for the initial registration and the two rounds of registration, contains the bit rate used by the information transmission, whether the information message is omitted or not, and executes mobility interception for the transmission flow of the history information according to the comparison value, thereby achieving the purpose of executing instant interception for the history information transmission between the plant station terminal and the management large-area collector, ensuring the correct and smooth transmission of the history information, improving the performance of the bit rate used by the transmission of the history information, and the plant station terminal transmits the history information to the management large-area collector for storage and transmits the history information to the management large-area collector for storage on the management large-area collector; the defects that in the prior art, historical record messages formed by malicious code prevention client software are only stored locally and are not transmitted to a large management area acquisition machine, the messages acquired by the large management area acquisition machine are incomplete, and the messages of the large management area acquisition machine are blocked so that the historical record messages are omitted during transmission are effectively overcome.
Drawings
Fig. 1 is a flow chart of step 1 to step 2 of the present invention.
FIG. 2 is a flow chart of step 2-1 through step 2-6 of the present invention.
FIG. 3 is a flow chart of step 2-6-1 through step 2-6-5 of the present invention.
FIG. 4 is a flow chart of steps 2-6-6 through 2-6-11 of the present invention.
FIG. 5 is a flow chart of steps 2-6-7-1 through 2-6-7-4 of the present invention.
FIG. 6 is a flow chart of steps 2-6-7-5 through 2-6-7-9 of the present invention.
FIG. 7 is a flow chart of step 2-4-1 through step 2-4-4 of the present invention.
FIG. 8 is a flow chart of steps 2-4-4-1 through 2-4-4-2 of the present invention.
Detailed Description
The invention will be further described with reference to the following figures and examples.
As shown in fig. 1-8, an integrated malicious code detection system inside an electric power production system includes:
the method comprises the steps that malicious code prevention client software is arranged on a station terminal in a station and used for searching and killing malicious codes on the station terminal and forming a history message; the malicious code prevention client software can be a 360 guardian or a Jinshan guardian, the station terminal can be a PC or a server, and the history information can comprise the name and the capacity of the malicious code on the station terminal to be searched and killed, and can also comprise the time point when the searching and killing of the malicious code is finished. The malicious codes include malicious codes such as computer viruses (viruses for short), trojan horses (trojan horses for short) and computer worms (worms for short).
A management large area collector is arranged in the production control large area; the management large area gathering machine can be a PC or a server.
The plant station terminal is connected with the management large area acquisition machine; the architecture of the station terminal connected with the management large area acquisition machine can be as follows: the plant station terminal and the management large area collecting machine are both positioned in a mobile communication network such as a 4G network, and the plant station terminal and the management large area collecting machine are in communication connection through the mobile communication network.
The plant station terminal and the management large area acquisition machine are connected with an attached server; the auxiliary server is also positioned in a mobile communication network such as a 4G network, and the plant station terminal and the management large area collecting machine are in communication connection with the auxiliary server through the mobile communication network.
The comprehensive malicious code detection system in the power generation system further comprises:
the system comprises a first creation module, a second creation module and a third creation module, wherein the first creation module is used for creating a message transmission link between a station terminal and a management large-area acquisition machine;
the first registration module is used for obtaining a first information message of the station terminal and executing initial maneuvering registration to obtain a first maneuvering symbol;
the acquisition module I is used for acquiring an information message II reaching the large management area acquisition machine according to the message transmission link, wherein the information message II is acquired after the information message I passes through an initial maneuvering register;
the system comprises a first setting module, a second setting module and a third setting module, wherein the first setting module is used for setting and managing a message feedback protocol of a large-area acquisition machine;
the first maneuvering module is used for obtaining a first feedback number of the second information message from the management large-area acquisition machine according to the message feedback protocol, and executing feedback maneuvering registration to obtain a second maneuvering mark;
the first interception module is used for transmitting the first maneuvering symbol and the second maneuvering symbol to an attached server to obtain a maneuvering interception value, and therefore maneuvering interception is carried out on history record message transmission between the plant station terminal and the management large area acquisition machine.
The comprehensive malicious code detection system in the power generation system further comprises:
the obtaining module II is used for obtaining a first bit rate used for information transmission and a first information message according to the first maneuvering mark;
the obtaining module III is used for obtaining a second bit rate used for information transmission and a second information message according to the second maneuvering mark;
a fourth obtaining module, configured to obtain a bit rate distance amount used for information transfer according to the first bit rate used for information transfer and the second bit rate used for information transfer;
the first identifying module is used for identifying whether the message of the second information message is a message omission or not according to the message of the first information message;
and the forming module I is used for forming a maneuvering interception value I by combining the bit rate distance used for information transmission if the information of the information message II is missed.
The comprehensive malicious code detection system in the power generation system further comprises:
the obtaining module is used for obtaining the permitted critical amount of the feedback number of the station terminal;
a second setting module, configured to set a bit rate recovery mode for information transmission in advance according to the permitted critical amount of the feedback number;
the first evaluation module is used for reversely evaluating the number of the instant feedback numbers of the station terminals according to the distance between the bit rate reply mode used for information transmission and the bit rate used for information transmission;
the second identification module is used for identifying whether the number of the instant feedback numbers reaches the preset warning number or not;
a second forming module, configured to form a first warning message if the number of the instant feedback numbers reaches the preset warning number;
and the deviation rectifying module is used for rectifying the deviation of the maneuvering interception value I according to the warning message I.
The comprehensive malicious code detection system in the power generation system further comprises:
the obtaining module six is used for obtaining the number of the first-level feedback numbers, the number of the second-level feedback numbers and the number of the third-level feedback numbers according to the permitted critical amount of the feedback numbers;
a third forming module, which is used for forming a first bit rate for transmission in advance according to the number of the first-level feedback numbers and the number of the second-level feedback numbers;
a forming module IV, configured to form a bit rate II for transmission setting in advance according to the number of the three-level feedback numbers, where the bit rate II for transmission setting in advance is smaller than the bit rate I for transmission setting in advance;
a second creating module, configured to create a bit rate reply mode for the information transfer according to the first bit rate for the pre-set transfer and the second bit rate for the pre-set transfer.
The comprehensive malicious code detection system in the power generation system further comprises:
a forming module V, wherein the forming module V is used for forming the bit rate used by the first-level transmission according to the number of the first-level feedback numbers;
a sixth forming module, configured to form a bit rate for secondary transmission according to the number of the secondary feedback numbers, where the bit rate for the primary transmission and the bit rate for the secondary transmission are both included in the first bit rate for transmission set in advance, and the bit rate for the primary transmission is greater than the bit rate for the secondary transmission;
a second registration module, configured to perform registration on the bit rate used for the primary transmission to obtain a first registration value, where the first registration value is a number of numbers in a number queue set by the station terminal, and the number of numbers is in a sufficient state;
a third registration module, configured to perform registration on the bit rate used for the secondary transmission to obtain a second registration value, where the second registration value represents a number of numbers in a number queue set by the station terminal, and the number of numbers is in a half-capacity condition;
and the forming module seventh is used for registering the preset second bit rate for transmission to obtain a third registration value, the third registration value indicates the number of the numbers in the number queue set by the station terminal, and the number of the numbers is in the shortage condition and forms the first warning message.
The comprehensive malicious code detection system in the power generation system further comprises:
an obtaining module seven, wherein the obtaining module seven is used for obtaining a primary feedback message I;
the first confirmation module is used for performing confirmation feedback on the second information message transmitted to the large management area acquisition machine according to the first main feedback message;
an obtaining module eight, configured to obtain a first sub-feedback message, where the first sub-feedback message is included in the first information message;
and the confirmation module II is used for executing confirmation feedback on the information message II transmitted to the large management area acquisition machine according to the auxiliary feedback message I.
The comprehensive malicious code detection system in the power generation system further comprises:
a third identifying module, configured to identify whether the second information packet is the same as the first information packet;
and the third confirmation module is used for executing confirmation feedback on the second information message transmitted to the large management area acquisition machine according to the first auxiliary feedback message if the second information message is the same as the first information message.
A method of a comprehensive malicious code detection system inside an electric power production system, comprising the steps of:
step 1, malicious code prevention client software on a plant station terminal performs searching and killing on malicious codes on the plant station terminal and forms a history message, and the history message is stored on the plant station terminal;
in practical application, history information formed by the malicious code prevention client software is usually only stored locally, a management large area acquisition machine in a production control large area in the power production system is used for acquiring various information of a plant station, and the history information formed by the malicious code prevention client software is only stored locally and is not transmitted to the management large area acquisition machine at present, so that the information acquired by the management large area acquisition machine is incomplete.
Step 2, the plant station terminal transmits the history record message to a management large area collector for storage;
if the history information formed by the malicious code prevention client software is transmitted to the management large-area acquisition machine, the defect of message congestion of the management large-area acquisition machine is caused often because the management large-area acquisition machine synchronously acquires too many messages, so that the history information is omitted during transmission.
Through the improvement, the step 2 comprises the following steps: establishing a message transmission link between a station terminal and a management large-area acquisition machine; obtaining an information message I of a station terminal, and executing initial maneuvering registration to obtain a maneuvering mark I; obtaining an information message II transmitted to the management large-area acquisition machine by the information message I according to the message transmission link; setting a message feedback protocol for managing a large-area acquisition machine; according to the message feedback protocol, obtaining a first feedback number of the management large-area acquisition machine on the information message II, and executing feedback mobile registration to obtain a second mobile mark; and transmitting the first maneuvering symbol and the second maneuvering symbol to an attached server to obtain a maneuvering interception value, and executing maneuvering interception on history record message transmission of the plant station terminal and the management large-area acquisition machine.
The step 2 specifically includes:
step 2-1, establishing a message transmission link between the station terminal and the management large-area acquisition machine;
step 2-2, obtaining an information message I of the station terminal, and executing initial maneuver registration to obtain a maneuver mark I;
that is, because the history message transmission between the factory station terminal and the management large-area collecting machine is often caused by the message jam of the management large-area collecting machine, so that the history message is missed during the transmission, and the shortcoming of the history message missing is overcome, within the invention, such a drawback formation can be efficiently overcome, by performing a motorised registration of the data transfer between the station terminal and the management mainframe, in particular a messaging link between the station terminal and the management mainframe can be created, the message transmission link is used for transmitting information messages between the plant station terminal and the management large-area acquisition machine, therefore, a first information message of the station terminal can be obtained, initial mobile registration is executed, a first mobile mark is obtained, and in detail, a random network element in a message transmission link can transmit the information message with an initial IP address; when the information message is transmitted at a large interval, a plurality of forwarding devices are required; each forwarding device is a network element or a switch, and transmits the information message to the next forwarding device according to the link structure; on a link for transmitting information messages, once a switch is in contact with the condition that the information messages with small capacity are transmitted, part of the information messages are usually omitted under the condition that no warning is given; here, the information message one contains a history of delivery, and by performing initial maneuver registration on the information message one, a maneuver symbol one can be obtained, which contains the history of delivery and the bit rate used for delivery.
Step 2-3, obtaining an information message II reaching the management large area acquisition machine according to the message transmission link, wherein the information message II is obtained after the information message I passes through an initial maneuvering register;
step 2-4, setting a message feedback protocol for managing the large-area acquisition machine;
that is, the created message transmission link can obtain a second information message reaching the management large-area collecting machine according to the message transmission link, wherein the second information message is obtained after the first information message passes through an initial maneuvering register, generally speaking, if the transmission flow is correct, the history record message in the second information message is the same as the history record message transmitted by the first information message, and if the transmission flow is incorrect, the history record message is different; preferably, to ensure that the history information is correctly transmitted to the management large area collecting machine, a message feedback protocol of the management large area collecting machine can be set, that is, when the information message is transmitted to the management large area collecting machine, the management large area collecting machine can feed back a number to the station terminal, and if the station terminal receives the number, the current history information is successfully transmitted.
Step 2-5, obtaining a first feedback number of the management large-area acquisition machine for the information message II according to the message feedback protocol, and executing feedback mobile registration to obtain a second mobile mark; maneuver symbol two contains the history of the delivery and the bit rate used for delivery.
And 2-6, transmitting the maneuvering symbol I and the maneuvering symbol II to an attached server to obtain a maneuvering interception value, and executing maneuvering interception on history record message transmission between the plant station terminal and the management large area acquisition machine.
That is, when the first information message is transmitted to the management large area acquisition machine, the management large area acquisition machine transmits a feedback number to the station terminal according to the second information message and performs feedback mobile registration, where the first feedback number and the second information message have a degree of association, and in detail, if a history record message transmission flow is correct and the second information message and the first information message are the same, the first feedback number also has a degree of association with the first information message; if the transmission flow of the history record message is incorrect, the information message II corresponds to the information message I, the feedback number I and the information message II have relevance, so the maneuver symbol I and the maneuver symbol II can be compared by registering the feedback number I, the maneuver symbol I and the maneuver symbol II have relevance, if the maneuver symbol I and the maneuver symbol II are the same, the history record message is transmitted smoothly, and if the maneuver symbol I and the maneuver symbol II are different, the history record message is transmitted not smoothly, so the instant interception of the history record message transmission between the factory station terminal and the management large-area acquisition machine is realized, and the smooth and correct transmission of the history record message is ensured, thereby improving the performance of the bit rate used for the delivery of the history messages.
Preferably, the steps 2 to 6 include:
step 2-6-1, according to the maneuver mark I, obtaining a bit rate I used for information transmission and a message of an information message I;
step 2-6-2, according to the second maneuvering symbol, obtaining a second bit rate used for information transmission and a second information message;
step 2-6-3, obtaining the bit rate distance amount used for information transmission according to the bit rate I used for information transmission and the bit rate II used for information transmission;
step 2-6-4, according to the message of the first information message, determining whether the message of the second information message is a message omission;
and 2-6-5, if the information of the information message II is missed, combining the bit rate distance quantity used by the information transmission to form a maneuvering interception value I.
That is, to perform the mobile interception on the history message transmission between the factory station terminal and the management mainframe collector, in detail, the mobile interception can obtain the first bit rate for information transmission and the first message of the information message according to the first mobile mark, and the first mobile mark and the first message have a relationship, so that the first bit rate for information transmission is the first bit rate for information transmission, the first message of the information message is the history message contained in the first message, and similarly, the second mobile mark and the second message have a relationship, so that the second bit rate for information transmission is the second bit rate for information transmission, and the second message of the information message is the history message contained in the second message, so as to perform the mobile interception according to the first bit rate for information transmission and the second bit rate for information transmission, obtaining a bit rate distancing amount for information transfer, the bit rate distancing amount for information transfer being an absolute value of a subtraction of a first bit rate for information transfer and a second bit rate for information transfer, it will act on the performance of information transmission, and in addition, according to the information of the information message one, it is determined whether the information of the information message two is a fault condition of information message omission or not, that is, whether the information is in a transmission period or not, if the information of the information message two is missed, combining the bit rate distance quantity used by the information transmission to form a maneuvering interception value one, here, the mobile interception value, as soon as it contains the information message, detects the information transfer failure condition immediately when a failure condition such as missing of the information message occurs during the transfer of the messaging link.
Preferably, the steps 2 to 6 further include:
step 2-6-6, obtaining the permitted critical quantity of the feedback number of the station terminal;
step 2-6-7, setting a bit rate recovery mode for information transmission in advance according to the permitted critical amount of the feedback number; the feedback number can be a preset number.
2-6-8, reversely evaluating the number of the instant feedback numbers of the station terminals according to the distance between the bit rate reply mode for information transmission and the bit rate for information transmission;
step 2-6-9, determining whether the number of the instant feedback numbers reaches the preset warning number;
step 2-6-10, if the number of the instant feedback numbers reaches the preset warning number, forming a warning message I;
and 2-6-11, correcting the maneuver interception value I according to the warning message I.
That is, to perform interception on the information transmission flow, in detail, the interception can be further performed according to the number of the number queue (the number queue is used to store the received number therein) set on the station terminal, that is, a feedback number permission critical amount of the station terminal is obtained, where the feedback number permission critical amount is the number of the highest feedback number that can be filled in the number queue set on the station terminal, which is described by taking a hundred examples, and in addition, a bit rate recovery mode for information transmission can be set in advance according to the feedback number permission critical amount, that is, a bit rate recovery mode for corresponding information transmission can be set according to the feedback number permission critical amount, that is, when the number of the feedback numbers in the number queue is one hundred, full bit rate information transmission can be set, and when the number of the feedback numbers in the number queue is fifty, setting half-bit rate message transmission, reversely evaluating the number of instant feedback numbers of the station terminal according to the bit rate recovery pattern for message transmission and the bit rate distance for message transmission, that is, if the bit rate distance for message transmission is smaller than a set reference value, indicating that the number of instant feedback numbers of the station terminal is close to one hundred and is in a sufficient condition or is in an insufficient condition if not, thereby determining that the number of instant feedback numbers reaches a preset warning number, wherein the preset warning number is described by fifty examples, that is, once the number of instant feedback numbers is reduced to fifty, deviation correction can be performed on the first maneuver monitoring value according to the first warning message, that is, the number of instant feedback numbers is reduced to fifty, the number of feedback numbers in the number queue is in a half-sufficiency condition, so that the information cannot be transmitted at a full bit rate, and the transmission performance of the information is affected.
Preferably, the steps 2-6-7 specifically include:
step 2-6-7-1, obtaining the number of first-level feedback numbers, the number of second-level feedback numbers and the number of third-level feedback numbers according to the permitted critical amount of the feedback numbers;
step 2-6-7-2, forming a bit rate I for presetting transmission according to the number of the primary feedback numbers and the number of the secondary feedback numbers;
step 2-6-7-3, forming a bit rate two for preset transmission according to the number of the three-level feedback numbers, wherein the bit rate two for the preset transmission is smaller than the bit rate one for the preset transmission;
and 2-6-7-4, establishing a bit rate reply mode for the information transmission according to the bit rate I and the bit rate II.
That is, to set in advance the bit rate recovery pattern for information transmission according to the feedback number permission threshold amount, in detail, the number of the primary feedback numbers, the number of the secondary feedback numbers, and the number of the tertiary feedback numbers can be obtained according to the feedback number permission threshold amount, where the number of the primary feedback numbers is described by eighty to one hundred examples, the number of the secondary feedback numbers is described by fifty to seventy nine examples, and the number of the tertiary feedback numbers is described by one to forty nine examples, so that the bit rate one for transmission for advance setting is formed according to the number of the primary feedback numbers and the number of the secondary feedback numbers, for example, when the number of the feedback numbers is between fifty to one hundred, the bit rate one for transmission for advance setting can be formed, where the bit rate for transmission for advance setting is described by an example of information transmission with a large bit rate, preferably, when the number of feedback numbers is between one and forty-nine, a bit rate two for the preset transfer can be formed, where the information transfer of the bit rate two for the preset transfer is described as an example, so as to create a bit rate recovery pattern for the information transfer according to the bit rate one for the preset transfer and the bit rate two for the preset transfer, and achieve a bit rate recovery pattern for the preset transfer according to the allowable threshold amount of the feedback numbers. Half bit rate is also half bit rate.
Preferably, after the steps 2-6-7-4, the method further comprises the following steps:
step 2-6-7-5, forming a bit rate for primary transmission according to the number of the primary feedback numbers;
step 2-6-7-6, according to the number of the secondary feedback numbers, forming the bit rate used by the secondary transmission, wherein the bit rate used by the primary transmission and the bit rate used by the secondary transmission are both contained in the bit rate I used by the preset transmission, and the bit rate used by the primary transmission is larger than the bit rate used by the secondary transmission;
step 2-6-7-7, registering the bit rate used by the primary transmission to obtain a registered value I, wherein the registered value is representative of the number of numbers in a number queue arranged by the station terminal, and the number of the numbers is in a sufficient condition;
step 2-6-7-8, performing registration on the bit rate used by the secondary transmission to obtain a registration value II, wherein the registration value II represents the number of numbers in a number queue arranged by the station terminal, and the number of the numbers is in a half-capacity condition;
and 2-6-7-9, registering the bit rate II used for the preset transmission to obtain a third registration value, wherein the third registration value represents the number of numbers in a number queue set by the station terminal, and the number of the numbers is in an insufficient condition and forms the first warning message.
That is, the bit rate for the pre-set transmission can be further divided, specifically, when the number of the primary feedback numbers is between eighty to one hundred, the bit rate for the primary transmission is illustrated by an information transmission example of a full bit rate, when the number of the secondary feedback numbers is between fifty to seventy nine, the bit rate for the secondary transmission is illustrated by an information transmission example of a non-full bit rate, wherein the bit rate for the primary transmission and the bit rate for the secondary transmission are both large bit rate transmissions, so as to register the bit rate for the primary transmission as a registration value of one, that is, the number of numbers in the number queue set by the station manufacturer terminal is in a sufficient condition; registering the bit rate used by the secondary transmission as a second registration value, namely that the number of the serial numbers in the serial number queue set by the station terminal is in a half-capacity condition; and registering the bit rate II used for the preset transmission as a registered value III, namely, the number of the numbers in the number queue set by the station terminal is in an insufficient condition, so as to alarm the insufficient condition.
Preferably, the steps 2 to 4 specifically include:
step 2-4-1, obtaining a primary feedback message I;
step 2-4-2, according to the first main feedback message, performing confirmation feedback on the second information message transmitted to the large management area acquisition machine;
step 2-4-3, obtaining a first auxiliary feedback message, wherein the first auxiliary feedback message is contained in the first information message;
and 2-4-4, according to the first auxiliary feedback message, performing confirmation feedback on the second information message transmitted to the large management area acquisition machine.
That is, to set up the message feedback protocol of the management large area collector, in detail, a primary feedback message one can be obtained according to the information message one, that is, the number of the information message one is set to the primary feedback message one, and then confirmation feedback is performed on the information message two transmitted to the management large area collector; in addition, a first sub-feedback message, that is, a number of the first information message is set to the first sub-feedback message, where the first sub-feedback message is included in the first information message and is an auxiliary message of the first information message, and then confirmation feedback is performed on the second information message transmitted to the large-area management collector.
Preferably, the steps 2-4-4 further comprise:
step 2-4-4-1, determining whether the information message II is the same as the information message I;
and 2-4-4-2, if the second information message is the same as the first information message, performing confirmation feedback on the second information message transmitted to the large management area acquisition machine according to the first auxiliary feedback message.
That is, before performing confirmation feedback on the second information message transmitted to the large management area acquisition machine according to the first sub feedback message, it can be determined whether the second information message is the same as the first information message, that is, if the history record message is transmitted smoothly during transmission, the second information message is the same as the first information message, and confirmation feedback can be performed on the second information message transmitted to the large management area acquisition machine according to the first sub feedback message; if the history information is transmitted with faults in the transmission period, the information message II is different from the information message I, so that the feedback number has the content of the faults, and the history information transmission of the information message I has the faults such as congestion.
Therefore, by executing initial registration on the data transmission mobility of the data transmission station terminal and executing two rounds of registration of the information transmission mobility on the number fed back by the management large-area acquisition machine, and executing attribute comparison on the initial registration and the two rounds of registration, the bit rate used by the information transmission is contained, whether the information message is omitted or not, and the like, the mobility interception is executed on the transmission flow of the history information according to the comparison value, so that the instant interception is executed on the history information transmission between the station terminal and the management large-area acquisition machine, the correct and smooth transmission of the history information is ensured, and the performance of the bit rate used for the transmission of the history information is improved.
The present application has been described above in an illustrative manner by way of embodiments, and it will be understood by those skilled in the art that the present disclosure is not limited to the embodiments described above, and various changes, modifications and substitutions can be made without departing from the scope of the present application.

Claims (10)

1. An integrated malicious code detection system inside an electric power production system, comprising:
the method comprises the steps that malicious code prevention client software is arranged on a station terminal in a station and used for searching and killing malicious codes on the station terminal and forming a history message; a management large area collector is arranged in the production control large area;
the plant station terminal is connected with the management large area acquisition machine;
the plant station terminal and the management large area acquisition machine are connected with an attached server;
the comprehensive malicious code detection system in the power generation system further comprises:
the system comprises a first creation module, a second creation module and a third creation module, wherein the first creation module is used for creating a message transmission link between a station terminal and a management large-area acquisition machine;
the first registration module is used for obtaining a first information message of the station terminal and executing initial maneuvering registration to obtain a first maneuvering symbol;
the acquisition module I is used for acquiring an information message II reaching the large management area acquisition machine according to the message transmission link, wherein the information message II is acquired after the information message I passes through an initial maneuvering register;
the system comprises a first setting module, a second setting module and a third setting module, wherein the first setting module is used for setting and managing a message feedback protocol of a large-area acquisition machine;
the first maneuvering module is used for obtaining a first feedback number of the second information message from the management large-area acquisition machine according to the message feedback protocol, and executing feedback maneuvering registration to obtain a second maneuvering mark;
the first interception module is used for transmitting the first maneuvering symbol and the second maneuvering symbol to an attached server to obtain a maneuvering interception value, and therefore maneuvering interception is carried out on history record message transmission between the plant station terminal and the management large area acquisition machine.
2. The system of claim 1, further comprising:
the obtaining module II is used for obtaining a first bit rate used for information transmission and a first information message according to the first maneuvering mark;
the obtaining module III is used for obtaining a second bit rate used for information transmission and a second information message according to the second maneuvering mark;
a fourth obtaining module, configured to obtain a bit rate distance amount used for information transfer according to the first bit rate used for information transfer and the second bit rate used for information transfer;
the first identifying module is used for identifying whether the message of the second information message is a message omission or not according to the message of the first information message;
and the forming module I is used for forming a maneuvering interception value I by combining the bit rate distance used for information transmission if the information of the information message II is missed.
3. The system of claim 1, further comprising:
the obtaining module is used for obtaining the permitted critical amount of the feedback number of the station terminal;
a second setting module, configured to set a bit rate recovery mode for information transmission in advance according to the permitted critical amount of the feedback number;
the first evaluation module is used for reversely evaluating the number of the instant feedback numbers of the station terminals according to the distance between the bit rate reply mode used for information transmission and the bit rate used for information transmission;
the second identification module is used for identifying whether the number of the instant feedback numbers reaches the preset warning number or not;
a second forming module, configured to form a first warning message if the number of the instant feedback numbers reaches the preset warning number;
the deviation rectifying module is used for rectifying the maneuver monitoring value I according to the warning message I;
the obtaining module six is used for obtaining the number of the first-level feedback numbers, the number of the second-level feedback numbers and the number of the third-level feedback numbers according to the permitted critical amount of the feedback numbers;
a third forming module, which is used for forming a first bit rate for transmission in advance according to the number of the first-level feedback numbers and the number of the second-level feedback numbers;
a forming module IV, configured to form a bit rate II for transmission setting in advance according to the number of the three-level feedback numbers, where the bit rate II for transmission setting in advance is smaller than the bit rate I for transmission setting in advance;
a second creating module, configured to create a bit rate reply mode for the information transfer according to the first bit rate for the pre-set transfer and the second bit rate for the pre-set transfer.
4. The integrated malicious code detection system inside an electric power production system according to claim 3, further comprising:
a forming module V, wherein the forming module V is used for forming the bit rate used by the first-level transmission according to the number of the first-level feedback numbers;
a sixth forming module, configured to form a bit rate for secondary transmission according to the number of the secondary feedback numbers, where the bit rate for the primary transmission and the bit rate for the secondary transmission are both included in the first bit rate for transmission set in advance, and the bit rate for the primary transmission is greater than the bit rate for the secondary transmission;
a second registration module, configured to perform registration on the bit rate used for the primary transmission to obtain a first registration value, where the first registration value is a number of numbers in a number queue set by the station terminal, and the number of numbers is in a sufficient state;
a third registration module, configured to perform registration on the bit rate used for the secondary transmission to obtain a second registration value, where the second registration value represents the number of numbers in a number queue set by the station terminal, and the number of numbers is in a half-capacity condition;
a forming module seventh, configured to perform registration on the bit rate two used for transmission, which is set in advance, to obtain a registration value three, where the registration value three indicates the number of numbers in a number queue set by the station terminal, where the number of numbers is in an insufficient condition, and form the warning message one;
an obtaining module seven, wherein the obtaining module seven is used for obtaining a primary feedback message I;
the first confirmation module is used for performing confirmation feedback on the second information message transmitted to the large management area acquisition machine according to the first main feedback message;
an obtaining module eight, configured to obtain a first sub-feedback message, where the first sub-feedback message is included in the first information message;
and the confirmation module II is used for executing confirmation feedback on the information message II transmitted to the large management area acquisition machine according to the auxiliary feedback message I.
5. The integrated malicious code detection system inside an electric power production system according to claim 4, further comprising:
a third identifying module, configured to identify whether the second information packet is the same as the first information packet;
and the third confirmation module is used for executing confirmation feedback on the second information message transmitted to the large management area acquisition machine according to the first auxiliary feedback message if the second information message is the same as the first information message.
6. A method for a comprehensive malicious code detection system within an electrical power production system, comprising the steps of:
step 1, malicious code prevention client software on a plant station terminal performs searching and killing on malicious codes on the plant station terminal and forms a history message, and the history message is stored on the plant station terminal;
step 2, the plant station terminal transmits the history record message to a management large area collector for storage;
the step 2 specifically includes:
step 2-1, establishing a message transmission link between the station terminal and the management large-area acquisition machine;
step 2-2, obtaining an information message I of the station terminal, and executing initial maneuver registration to obtain a maneuver mark I;
step 2-3, obtaining an information message II reaching the management large area acquisition machine according to the message transmission link, wherein the information message II is obtained after the information message I passes through an initial maneuvering register;
step 2-4, setting a message feedback protocol for managing the large-area acquisition machine;
step 2-5, obtaining a first feedback number of the management large-area acquisition machine for the information message II according to the message feedback protocol, and executing feedback mobile registration to obtain a second mobile mark;
and 2-6, transmitting the maneuvering symbol I and the maneuvering symbol II to an attached server to obtain a maneuvering interception value, and executing maneuvering interception on history record message transmission between the plant station terminal and the management large area acquisition machine.
7. The method of an integrated malicious code detection system inside an electric power production system according to claim 6, wherein the steps 2-6 include:
step 2-6-1, according to the maneuver mark I, obtaining a bit rate I used for information transmission and a message of an information message I;
step 2-6-2, according to the second maneuvering symbol, obtaining a second bit rate used for information transmission and a second information message;
step 2-6-3, obtaining the bit rate distance amount used for information transmission according to the bit rate I used for information transmission and the bit rate II used for information transmission;
step 2-6-4, according to the message of the first information message, determining whether the message of the second information message is a message omission;
step 2-6-5, if the message of the information message two is missed, combining the bit rate distance quantity used by the information transmission to form a maneuvering interception value one;
the steps 2-6 further comprise:
step 2-6-6, obtaining the permitted critical quantity of the feedback number of the station terminal;
step 2-6-7, setting a bit rate recovery mode for information transmission in advance according to the permitted critical amount of the feedback number;
2-6-8, reversely evaluating the number of the instant feedback numbers of the station terminals according to the distance between the bit rate reply mode for information transmission and the bit rate for information transmission;
step 2-6-9, determining whether the number of the instant feedback numbers reaches the preset warning number;
step 2-6-10, if the number of the instant feedback numbers reaches the preset warning number, forming a warning message I;
and 2-6-11, correcting the maneuver interception value I according to the warning message I.
8. The method of an integrated malicious code detection system inside an electric power production system according to claim 6, wherein the steps 2-6-7 specifically include:
step 2-6-7-1, obtaining the number of first-level feedback numbers, the number of second-level feedback numbers and the number of third-level feedback numbers according to the permitted critical amount of the feedback numbers;
step 2-6-7-2, forming a bit rate I for presetting transmission according to the number of the primary feedback numbers and the number of the secondary feedback numbers;
step 2-6-7-3, forming a bit rate two for preset transmission according to the number of the three-level feedback numbers, wherein the bit rate two for preset transmission is smaller than the bit rate one for preset transmission;
2-6-7-4, establishing a bit rate reply mode for the information transmission according to the bit rate I and the bit rate II;
after the steps 2-6-7-4, the method further comprises the following steps:
step 2-6-7-5, forming a bit rate for primary transmission according to the number of the primary feedback numbers;
step 2-6-7-6, according to the number of the secondary feedback numbers, forming a bit rate for secondary transmission, wherein the bit rate for the primary transmission and the bit rate for the secondary transmission are both contained in the bit rate I for the preset transmission, and the bit rate for the primary transmission is greater than the bit rate for the secondary transmission;
step 2-6-7-7, registering the bit rate used by the primary transmission to obtain a first registration value, wherein the first registration value represents the number of numbers in a number queue arranged by the station terminal, and the number of the numbers is in a sufficient condition;
step 2-6-7-8, performing registration on the bit rate used by the secondary transmission to obtain a registration value II, wherein the registration value II represents the number of numbers in a number queue arranged by the station terminal, and the number of the numbers is in a half-foot condition;
and 2-6-7-9, registering the bit rate II used for transmission in advance to obtain a third registration value, wherein the third registration value represents the number of numbers in a number queue set by the station terminal, and the number of the numbers is in an insufficient condition and forms the first warning message.
9. The method of an integrated malicious code detection system inside an electric power production system according to claim 8, wherein the steps 2-4 specifically include:
step 2-4-1, obtaining a primary feedback message I;
step 2-4-2, according to the first main feedback message, performing confirmation feedback on the second information message transmitted to the large management area acquisition machine;
step 2-4-3, obtaining a first auxiliary feedback message, wherein the first auxiliary feedback message is contained in the first information message;
and 2-4-4, according to the first auxiliary feedback message, performing confirmation feedback on the second information message transmitted to the large management area acquisition machine.
10. The method of an integrated malicious code detection system inside an electric power production system according to claim 9, wherein the steps 2-4-4 further include:
step 2-4-4-1, determining whether the information message II is the same as the information message I;
and 2-4-4-2, if the second information message is the same as the first information message, performing confirmation feedback on the second information message transmitted to the large management area acquisition machine according to the first auxiliary feedback message.
CN202210200964.5A 2022-03-03 2022-03-03 Comprehensive malicious code detection system and method in power production system Active CN114266051B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210200964.5A CN114266051B (en) 2022-03-03 2022-03-03 Comprehensive malicious code detection system and method in power production system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210200964.5A CN114266051B (en) 2022-03-03 2022-03-03 Comprehensive malicious code detection system and method in power production system

Publications (2)

Publication Number Publication Date
CN114266051A true CN114266051A (en) 2022-04-01
CN114266051B CN114266051B (en) 2022-06-07

Family

ID=80833888

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210200964.5A Active CN114266051B (en) 2022-03-03 2022-03-03 Comprehensive malicious code detection system and method in power production system

Country Status (1)

Country Link
CN (1) CN114266051B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114596172A (en) * 2022-05-10 2022-06-07 江苏未来智慧信息科技有限公司 Intelligent wind farm production management system and management method

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102571635A (en) * 2012-01-18 2012-07-11 浪潮(北京)电子信息产业有限公司 Message transmission method and equipment
CN112968869A (en) * 2021-01-29 2021-06-15 国网河南省电力公司平顶山供电公司 Information safety monitoring system of electric power production control large area
US20210276181A1 (en) * 2020-03-04 2021-09-09 Fanuc America Corporation Dynamic messaging system for factory automation device

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102571635A (en) * 2012-01-18 2012-07-11 浪潮(北京)电子信息产业有限公司 Message transmission method and equipment
US20210276181A1 (en) * 2020-03-04 2021-09-09 Fanuc America Corporation Dynamic messaging system for factory automation device
CN112968869A (en) * 2021-01-29 2021-06-15 国网河南省电力公司平顶山供电公司 Information safety monitoring system of electric power production control large area

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114596172A (en) * 2022-05-10 2022-06-07 江苏未来智慧信息科技有限公司 Intelligent wind farm production management system and management method

Also Published As

Publication number Publication date
CN114266051B (en) 2022-06-07

Similar Documents

Publication Publication Date Title
US20020080938A1 (en) Method and apparatus for generating dynamic graphical representations and real-time notification of the status of a remotely monitored system
CN110646699A (en) Charging pile fault identification method, storage medium, charging pile and electronic equipment
CN114266051B (en) Comprehensive malicious code detection system and method in power production system
EP3547236A1 (en) Method and device for calculating household appliance faults
CN104219091A (en) System and method for network operation fault detection
CN106790266A (en) The communication means and device of a kind of intelligent distribution type feeder automation
CN110311990A (en) A kind of configurable internet of things data acquisition system and configuration method
CN111597271B (en) Power communication information storage system
CN103731296A (en) System and method for warning message centralized monitoring in distributed system
CN103728911A (en) Early warning method and device for data monitoring
CN114189052B (en) Power plant state monitoring system and monitoring method
CN113821242B (en) Intelligent firmware matching method and system
CN110908956B (en) Information protection master station system and fault information archiving method thereof
CN116955232A (en) Hardware identification method and device based on control system
CN107316085A (en) A kind of stage equipment fault handling method and system
CN205091588U (en) Supplementary monitoring system of circuit safety intelligence
CN112865312A (en) Power dispatching system and power data processing method
CN112995130A (en) Electric power thing networking data transmission system
CN117544533A (en) Detection method for working state of power gateway
CN111865822A (en) Service flow warning method and device based on intelligent substation switch
CN110611602A (en) Two-layer point-to-point channel state monitoring method and system
CN115314362B (en) Remote dispatching terminal fault detection method and system based on telemetry network
CN112636461B (en) Remote restart method and system for fault recorder
CN113805476B (en) High-reliability network early warning method and system
CN117614802A (en) Method for confirming working state of power gateway based on detection period

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant